Combining Symbolic Execution and Model Checking to Verify MPI Programs

Total Page:16

File Type:pdf, Size:1020Kb

Combining Symbolic Execution and Model Checking to Verify MPI Programs Combining Symbolic Execution and Model Checking to Verify MPI Programs Hengbiao Yu1∗, Zhenbang Chen1∗, Xianjin Fu1,2, Ji Wang1,2∗, Zhendong Su3, Jun Sun4, Chun Huang1, Wei Dong1 1College of Computer, National University of Defense Technology, Changsha, China 2State Key Laboratory of High Performance Computing, National University of Defense Technology, Changsha, China 3Department of Computer Science, ETH Zurich, Switzerland 4School of Information Systems, Singapore Management University, Singapore {hengbiaoyu,zbchen,wj}@nudt.edu.cn,[email protected],[email protected],[email protected] ABSTRACT South Korea. ACM, New York, NY, USA, 17 pages. https://doi.org/XX.XXXX/ Message passing is the standard paradigm of programming in high- XXXXXXX.XXXXXXX performance computing. However, verifying Message Passing In- terface (MPI) programs is challenging, due to the complex program 1 INTRODUCTION features (such as non-determinism and non-blocking operations). In this work, we present MPI symbolic verifier (MPI-SV), the first Nowadays, an increasing number of high-performance computing symbolic execution based tool for automatically verifying MPI pro- (HPC) applications have been developed to solve large-scale prob- grams with non-blocking operations. MPI-SV combines symbolic lems [11]. The Message Passing Interface (MPI) [78] is the current execution and model checking in a synergistic way to tackle the de facto standard programming paradigm for developing HPC appli- challenges in MPI program verification. The synergy improves the cations. Many MPI programs are developed with significant human scalability and enlarges the scope of verifiable properties. We have effort. One of the reasons is that MPI programs are error-prone implemented MPI-SV1 and evaluated it with 111 real-world MPI because of complex program features (such as non-determinism verification tasks. The pure symbolic execution-based technique and asynchrony) and their scale. Improving the reliability of MPI successfully verifies 61 out of the 111 tasks (55%) within onehour, programs is challenging [29, 30]. while in comparison, MPI-SV verifies 100 tasks (90%). On aver- Program analysis [64] is an effective technique for improving age, compared with pure symbolic execution, MPI-SV achieves 19x program reliability. Existing methods for analyzing MPI programs speedups on verifying the satisfaction of the critical property and can be categorized into dynamic and static approaches. Most ex- 5x speedups on finding violations. isting methods are dynamic, such as debugging [51], correctness checking [71] and dynamic verification [83]. These methods need CCS CONCEPTS concrete inputs to run MPI programs and perform analysis based on runtime information. Hence, dynamic approaches may miss • Software and its engineering → Software verification and input-related program errors. Static approaches [5, 9, 55, 74] ana- validation; lyze abstract models of MPI programs and suffer from false alarms, KEYWORDS manual effort, and poor scalability. To the best of our knowledge, existing automated verification approaches for MPI programs either Symbolic Verification; Symbolic Execution; Model Checking; Mes- do not support input-related analysis or fail to support the analysis sage Passing Inteface; Synergy of the MPI programs with non-blocking operations, the invocations ACM Reference Format: of which do not block the program execution. Non-blocking opera- Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun tions are ubiquitous in real-world MPI programs for improving the Sun, Chun Huang, and Wei Dong. 2020. Combining Symbolic Execution performance but introduce more complexity to programming. arXiv:1803.06300v2 [cs.PL] 17 Jan 2020 and Model Checking to Verify MPI Programs. In ICSE ’20: ICSE ’20: 42nd Symbolic execution [27, 48] supports input-related analysis by International Conference on Software Engineering , May 23-29, 2020, Seoul, systematically exploring a program’s path space. In principle, sym- bolic execution provides a balance between concrete execution and ∗The first two authors contributed equally to this work and are co-first authors. Zhen- bang Chen and Ji Wang are the corresponding authors. static abstraction with improved input coverage or more precise 1MPI-SV is available https://mpi-sv.github.io. program abstraction. However, symbolic execution based analyses suffer from path explosion due to the exponential increase ofpro- Permission to make digital or hard copies of all or part of this work for personal or gram paths w.r.t. the number of conditional statements. The problem classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation is particularly severe when analyzing MPI programs because of par- on the first page. Copyrights for components of this work owned by others than ACM allel execution and non-deterministic operations. Existing symbolic must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a execution based verification approaches [77][25] do not support fee. Request permissions from [email protected]. non-blocking MPI operations. ICSE ’20, May 23-29, 2018, Seoul, South Korea In this work, we present MPI-SV, a novel verifier for MPI pro- © 2020 Association for Computing Machinery. ACM ISBN xxx-x-xxxx-xxxx-x/xx/xx...$15.00 grams by smartly integrating symbolic execution and model check- https://doi.org/XX.XXXX/XXXXXXX.XXXXXXX ing. As far as we know, MPI-SV is the first automated verifier that Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun Sun, Chun Huang, and Wei Dong supports non-blocking MPI programs and LTL [58] property verifi- Proc ::= var r : T j r := e j Comm j Proc ; Proc j cation. MPI-SV uses symbolic execution to extract path-level models if e Proc else Proc j while e do Proc from MPI programs and verifies the models w.r.t. the expected prop- Comm ::= Ssend(e) j Send(e) j Recv(e) j Recv(*) j Barrier j j j j erties by model checking [17]. The two techniques complement ISend(e,r) IRecv(e,r) IRecv(*,r) Wait(r) each other: (1) symbolic execution abstracts the control and data dependencies to generate verifiable models for model checking, and Figure 1: Syntax of a core MPI language. (2) model checking improves the scalability of symbolic execution by leveraging the verification results to prune redundant paths and enlarges the scope of verifiable properties of symbolic execution. 2 ILLUSTRATION In particular, MPI-SV combines two algorithms: (1) symbolic execution of non-blocking MPI programs with non-deterministic In this section, we first introduce MPI programs and use an example operations, and (2) modeling and checking the behaviors of an to illustrate the problem that this work targets. Then, we overview MPI program path precisely. To safely handle non-deterministic MPI-SV informally by the example. operations, the first algorithm delays the message matchings of non- deterministic operations as much as possible. The second algorithm 2.1 MPI Syntax and Motivating Example extracts a model from an MPI program path. The model represents MPI implementations, such as MPICH [31] and OpenMPI [26], pro- all the path’s equivalent behaviors, i.e., the paths generated by vide the programming interfaces of message passing to support changing the interleavings and matchings of the communication the development of parallel applications. An MPI program can be operations in the path. We have proved that our modeling algorithm implemented in different languages, such as C and C++. Without is precise and consistent with the MPI standard [24]. We feed the loss of generality, we focus on MPI programs written in C. Let T generated models from the second algorithm into a model checker be a set of types, N a set of names, and E a set of expressions. For to perform verification w.r.t. the expected properties, i.e., safety simplifying the discussion, we define a core language for MPI pro- and liveness properties in linear temporal logic (LTL) [58]. If the cesses in Figure 1, where T 2 T, r 2 N, and e 2 E. An MPI program extracted model from a pathp satisfies the property φ,p’s equivalent MP is defined by a finite set of processes fProci j 0 ≤ i ≤ ng. For paths can be safely pruned; otherwise, if the model checker reports a brevity, we omit complex language features (such as the messages counterexample, a violation of φ is found. This way, we significantly in the communication operations and pointer operations) although boost the performance of symbolic execution by pruning a large MPI-SV does support real-world MPI C programs. set of paths which are equivalent to certain paths that have been The statement var r : T declares a variable r with type T. The already model-checked. statement r := e assigns the value of expression e to variable r. We have implemented MPI-SV for MPI C programs based on A process can be constructed from basic statements by using the Cloud9 [10] and PAT [80]. We have used MPI-SV to analyze 12 real- composition operations including sequence, condition and loop. world MPI programs, totaling 47K lines of code (LOC) (three are For brevity, we incorporate the key message passing operations in beyond the scale that the state-of-the-art MPI verification tools can the syntax, where e indicates the destination process’s identifier. handle), w.r.t. the deadlock freedom property and non-reachability These message passing operations can be blocking or non-blocking. properties. For the 111 deadlock freedom verification tasks, when First, we introduce blocking operations: we set the time threshold to be an hour, MPI-SV can complete 100 • Ssend(e): sends a message to the eth process, and the sending tasks, i.e., deadlock reported or deadlock freedom verified, while process blocks until the message is received by the destination pure symbolic execution can complete 61 tasks.
Recommended publications
  • Suppression of DNA-Damage Checkpoint Signaling by Rsk-Mediated Phosphorylation of Mre11
    Suppression of DNA-damage checkpoint signaling by Rsk-mediated phosphorylation of Mre11 Chen Chen, Liguo Zhang, Nai-Jia Huang, Bofu Huang, and Sally Kornbluth1 Department of Pharmacology and Cancer Biology, Duke University School of Medicine, Durham, NC 27710 Edited by Tony Hunter, The Salk Institute for Biological Studies, La Jolla, CA, and approved November 12, 2013 (received for review April 9, 2013) Ataxia telangiectasia mutant (ATM) is an S/T-Q–directed kinase A hallmark of cancer cells is their ability to override cell-cycle that is critical for the cellular response to double-stranded breaks checkpoints, including the DSB checkpoint, which arrests the cell (DSBs) in DNA. Following DNA damage, ATM is activated and cycle to allow adequate time for damage repair. Previous studies recruited by the MRN protein complex [meiotic recombination 11 have implicated the MAPK pathway in inhibition of DNA-dam- (Mre11)/DNA repair protein Rad50/Nijmegen breakage syndrome age signaling: PKC suppresses DSB-induced G2/M checkpoint 1 proteins] to sites of DNA damage where ATM phosphorylates signaling following ionizing radiation via activation of ERK1/2 multiple substrates to trigger cell-cycle arrest. In cancer cells, this (22); activation of RAF kinase, leading to activation of MEK/ regulation may be faulty, and cell division may proceed even in ERK/Rsk, also can suppress G2/M checkpoint signaling (23). the presence of damaged DNA. We show here that the ribosomal Given its prominent role in multiple cancers, the MAPK s6 kinase (Rsk), often elevated in cancers, can suppress DSB-induced pathway is an attractive therapeutic target. Indeed, treatment of melanoma using the RAF inhibitor vemurafenib has shown some ATM activation in both Xenopus egg extracts and human tumor cell clinical success, as has treatment of nonsmall cell lung carcinoma lines.
    [Show full text]
  • The Significance and Inheritance of Huang Di Culture
    ISSN 1799-2591 Theory and Practice in Language Studies, Vol. 8, No. 12, pp. 1698-1703, December 2018 DOI: http://dx.doi.org/10.17507/tpls.0812.17 The Significance and Inheritance of Huang Di Culture Donghui Chen Henan Academy of Social Sciences, Zhengzhou, Henan, China Abstract—Huang Di culture is an important source of Chinese culture. It is not mechanical, still and solidified but melting, extensible, creative, pioneering and vigorous. It is the root of Chinese culture and a cultural system that keeps pace with the times. Its influence is enduring and universal. It has rich connotations including the “Root” Culture, the “Harmony” Culture, the “Golden Mean” Culture, the “Governance” Culture. All these have a great significance for the times and the realization of the Great Chinese Dream, therefore, it is necessary to combine the inheritance of Huang Di culture with its innovation, constantly absorb the fresh blood of the times with a confident, open and creative attitude, give Huang Di culture a rich connotation of the times, tap the factors in Huang Di culture that fit the development of the modern times to advance the progress of the country and society, and make Huang Di culture still full of vitality in the contemporary era. Index Terms—Huang Di, Huang Di culture, Chinese culture I. INTRODUCTION Huang Di, being considered the ancestor of all Han Chinese in Chinese mythology, is a legendary emperor and cultural hero. His victory in the war against Emperor Chi You is viewed as the establishment of the Han Chinese nationality. He has made great many accomplishments in agriculture, medicine, arithmetic, calendar, Chinese characters and arts, among which, his invention of the principles of Traditional Chinese medicine, Huang Di Nei Jing, has been seen as one of the greatest contributions to Chinese medicine.
    [Show full text]
  • The Later Han Empire (25-220CE) & Its Northwestern Frontier
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2012 Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier Wai Kit Wicky Tse University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian History Commons, Asian Studies Commons, and the Military History Commons Recommended Citation Tse, Wai Kit Wicky, "Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier" (2012). Publicly Accessible Penn Dissertations. 589. https://repository.upenn.edu/edissertations/589 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/589 For more information, please contact [email protected]. Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier Abstract As a frontier region of the Qin-Han (221BCE-220CE) empire, the northwest was a new territory to the Chinese realm. Until the Later Han (25-220CE) times, some portions of the northwestern region had only been part of imperial soil for one hundred years. Its coalescence into the Chinese empire was a product of long-term expansion and conquest, which arguably defined the egionr 's military nature. Furthermore, in the harsh natural environment of the region, only tough people could survive, and unsurprisingly, the region fostered vigorous warriors. Mixed culture and multi-ethnicity featured prominently in this highly militarized frontier society, which contrasted sharply with the imperial center that promoted unified cultural values and stood in the way of a greater degree of transregional integration. As this project shows, it was the northwesterners who went through a process of political peripheralization during the Later Han times played a harbinger role of the disintegration of the empire and eventually led to the breakdown of the early imperial system in Chinese history.
    [Show full text]
  • Jade Huang and Chinese Culture Identity: Focus on the Myth of “Huang of Xiahoushi”
    Journal of Literature and Art Studies, June 2016, Vol. 6, No. 6, 603-618 doi: 10.17265/2159-5836/2016.06.003 D DAVID PUBLISHING Jade Huang and Chinese Culture Identity: Focus on the Myth of “Huang of Xiahoushi” TANG Qi-cui, WU Yu-wei Shanghai Jiao Tong University, Shanghai, China This paper focus on the myth of “Huang of Xiahoushi” (夏后氏之璜), focusing on the distribution of Jade Huang (玉璜) since the early neolithic and its process of pluralistic integration. The paper explores the story of ethnic group, cultural identification and the significance of Jade Huang in the discourse construction of etiquette civilization behind the mythic narrative based on multi-evidence method and the local meaning of literature in ancient Chinese context. Keywords: Jade Huang, Huang of Xiahoushi, unified diversity, Chinese identity, etiquette civilization, multi-evidence method Introduction Modern archeological relics including potteries, jades and bronzes bring back the lost history; the process of how Chinese unified diversity took shape in general and the great tradition of jade culture in eight thousand in particular. The handed-down documents echo each other at a distance provide solid evidences for the origin of civilization of rite and music and the core values based on jade belief. Jade Huang is an important one of it. It is illuminated by numerous records about Jade Huang in ancient literature, as well as a large number of archaeology findings past 7,000 years. The paper seeks to focus on the following questions: what is the function of Jade Huang in historic and prehistoric period? Moreover, what is the function of “Huang of Xiahoushi”, which belonged to emperor and symbolized special power in historic documents and myths and legends in ancient china? Jade Huang: Etiquette and Literature Jade Huang (Yu Huang, Semi-circular/annular Jade Pendant) is a type of jade artifact which is seemed to be remotely related to etiquette and literature.
    [Show full text]
  • Effects of Bofu-Tsusho-San on Diabetes and Hyperlipidemia Associated with AMP-Activated Protein Kinase and Glucose Transporter 4 in High-Fat-Fed Mice
    Int. J. Mol. Sci. 2014, 15, 20022-20044; doi:10.3390/ijms151120022 OPEN ACCESS International Journal of Molecular Sciences ISSN 1422-0067 www.mdpi.com/journal/ijms Article Effects of Bofu-Tsusho-San on Diabetes and Hyperlipidemia Associated with AMP-Activated Protein Kinase and Glucose Transporter 4 in High-Fat-Fed Mice Cheng-Hsiu Lin 1, Yueh-Hsiung Kuo 2,3 and Chun-Ching Shih 4,* 1 Department of Internal Medicine, Feng-Yuan Hospital, Ministry of Health and Welfare, Fengyuan District, Taichung City 42055, Taiwan; E-Mail: [email protected] 2 Department of Chinese Pharmaceutical Sciences and Chinese Medicine Resources, China Medical University, Taichung City 40402, Taiwan; E-Mail: [email protected] 3 Department of Biotechnology, Asia University, Taichung City 41354, Taiwan 4 Graduate Institute of Pharmaceutical Science and Technology, College of Health Science, Central Taiwan University of Science and Technology, No. 666, Buzih Road, Beitun District, Taichung City 40601, Taiwan * Author to whom correspondence should be addressed; E-Mail: [email protected]; Tel.: +88-64-2239-1647 (ext. 3978-3979); Fax: +88-64-2239-4256. External Editor: Chang Won Choi Received: 16 August 2014; in revised form: 6 October 2014 / Accepted: 23 October 2014 / Published: 4 November 2014 Abstract: This study was undertaken to examine the effect and mechanism of Bofu-tsusho-san formula (BO) on hyperglycemia and hyperlipidemia and in mice fed with a high-fat (HF) diet. The C57BL/6J mice were received control/HF diet for 12 weeks, and oral administration of BO (at three doses) or rosiglitazone (Rosi) or vehicle for the last 4 weeks.
    [Show full text]
  • Modes of Membrane Interaction of a Natural Cysteine-Rich Peptide: Viscotoxin A3
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Biochimica et Biophysica Acta 1559 (2002) 145^159 www.bba-direct.com Modes of membrane interaction of a natural cysteine-rich peptide: viscotoxin A3 Alexandre Coulon a, Emir Berkane a, Anne-Marie Sautereau a, Konrad Urech b, Pierre Rouge¨ a, Andre¨ Lopez a;* a Institut de Pharmacologie et de Biologie Structurale, UMR-CNRS 5089, 205 Route de Narbonne, 31077 Toulouse Cedex 4, France b Verein fu«r Krebsforschung, Hiscia Institut, CH 4144 Arlesheim, Switzerland Received 9 October 2001; received in revised form 15 November 2001; accepted 22 November 2001 Abstract Among the very homologous family of K- and L-thionins, known for their antimicrobial activity, the viscotoxin subfamily differs from other members because it is cytotoxic against tumoral cells but weakly hemolytic. We studied the interactions between the most active of these toxins, viscotoxin A3 (VA3), and model membranes made of phosphatidylcholine and phosphatidylserine (PS), the major zwitterionic and acidic phospholipids found in eukaryotic cells. Monolayer studies showed that electrostatic forces are essential for the interaction and are mainly involved in modulating the embedding of the toxin in the PS head group region. This in turn induces membrane stiffening, as shown by fluorescence polarization assays with 1,6-diphenyl-1,3,5-hexatriene and its derivatives. Moreover, vesicle permeabilization analyses showed that there are two modes of interaction, which are directly related to the stiffening effect and depend on the amount of VA3 bound to the surface of the vesicles.
    [Show full text]
  • JIDONG HUANG Ph.D
    Jidong HUANG JIDONG HUANG Ph.D. Associate Professor GSU Second Century Initiative (2CI) Scholar Department of Health Policy and Behavioral Sciences School of Public Health Georgia State University 140 Decatur Street, Atlanta, GA 30303 Phone: 404-413-9337 Email: [email protected] Website: https://publichealth.gsu.edu/profile/jidon-huang/ Permanent Resident of the United States of America (First Preference EB-1: Outstanding Professors and Researchers) Education PhD Economics 2007 Health Economics and Labor Economics concentration Department of Economics University of Illinois at Chicago, Chicago, IL. (http://www.uic.edu/) MA Economics 2004 Department of Economics University of Illinois at Chicago, Chicago, IL. (http://www.uic.edu/) BA Economics 2000 School of Finance Renmin University of China, Beijing, China (http://www.ruc.edu.cn/en) Academic Positions Associate Professor (Tenure Track), GSU 2CI Scholar Aug. 2016 – Present Department of Health Policy and Behavioral Sciences School of Public Health Georgia State University Atlanta, Georgia Research Associate Professor 2015 – July 2016 Department of Economics University of Illinois at Chicago Chicago, Illinois Senior Research Scientist 2013 – July 2016 Health Policy Center and Health Media Collaboratory Institute for Health Research and Policy University of Illinois at Chicago Chicago, Illinois Page | 1 Jidong HUANG Research Specialist 2009 – 2013 Health Policy Center Institute for Health Research and Policy University of Illinois at Chicago Chicago, Illinois Non-Academic Positions Consultant 2007 – 2009 NERA Economic Consulting New York City, New York Project Coordinator 2000 – 2001 Save the Children (UK) Yunnan Education Program Kunming, Yunnan, China Google Scholar Citations Citations: 867 as of April 2018 H-Index: 16 as of April 2018 Peer-Reviewed Publications 50.
    [Show full text]
  • E Cacy and Safety of Apatinib in Patients with Recurrent Or
    Ecacy and Safety of Apatinib in Patients with Recurrent or Refractory Melanoma Shumin Yuan Henan Cancer Hospital Qiang Fu Henan Cancer Hospital Yingkun Ren Henan Cancer Hospital Zhimeng Li Henan Cancer Hospital Huijuan Wang Henan Cancer Hospital Xiaojie Zhang Henan Cancer Hospital Hao Huang Henan Cancer Hospital Yonghao Yang Henan Cancer Hospital Yiman Shang Henan Cancer Hospital Quanli Gao Henan Cancer Hospital Zibing Wang ( [email protected] ) Aliated Cancer Hospital of Zhengzhou University & Henan Cancer Hospital Research article Keywords: Melanoma, Targeted therapy, Apatinib, PFS, OS Posted Date: October 5th, 2020 DOI: https://doi.org/10.21203/rs.3.rs-67706/v1 License: This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Page 1/13 Abstract Background: Prognosis of patients with metastatic malignant melanoma is very poor and partly due to high resistance to conventional chemotherapies. The study’s objectives were to assess the activity and tolerability of apatinib, an oral small molecule anti-angiogenesis inhibitor, in patients with recurrent advanced melanoma. Methods: This was a single-arm, single-center phase II trial. The primary endpoint was progression-free survival (PFS) and the secondary endpoints were objective response rate (ORR), disease control rate (DCR), and overall survival (OS). Eligible patients received at least one rst-line therapy for advanced melanoma and experienced recurrence. Apatinib (500 mg) was orally administered daily. Trail registration: Clinical Trials, ID: NCT03383237. Registered on 24 December 2017. URL of trail registry record: https://register.clinicaltrials.gov. Results: Fifteen patients were included in the analysis. The median PFS was 4.0 months.
    [Show full text]
  • New Telepathology and Telemedicine Partnership Between UCLA Health and Zhengzhou, China
    New TelePathology and TeleMedicine Partnership between UCLA Health and Zhengzhou, China. On April 10, 2015, the Zhengzhou International TeleMedicine Center was officially unveiled. The Vice Mayor of Zhengzhou, Ms. Liu Dong, the Director of Zhengzhou Municipal Health and Family Planning Commission (HFPC), Mr. Gu Jianqin, the Vice Director of Henan Provincial HFPC, Mr. Huang Wei, the CEO of Zhengzhou 6th People’s Hospital (Z6PH), Mr. Xu Jinsheng, and several hundred health professionals and workers from local hospitals attended the opening ceremony of the Center. A delegation from UCLA also attended and spoke at the ceremony: Dr. Jianyu Rao, professor of pathology and laboratory medicine at the Geffen School of Medicine, Dr. Serge Alexanian, Chief Medical Officer and Laboratory Medical Director of UCLA Health / CTI Medical Laboratories, Mr. Michael Burke, Director of UCLA Health International Development, and Dr. Qingmei Jia, Researcher of Division of Infectious Diseases, Department of Medicine. The Zhengzhou 6th People’s hospital, also known as Henan Provincial Infectious Diseases Hospital, was established in 1953. It is a comprehensive infectious Diseases hospital in Henan province, providing medical treatment, teaching, scientific research, prevention, health care, and rehabilitation to the local and provincial community. An agreement reached among UCLA, the Second Affiliated Hospital of Zhejiang University (SAHZU), and Z6PH led the Zhengzhou Municipal HFPC to establish the Zhengzhou International TeleMedicine Center to advance medical care and meet the increasingly specialized medical needs of patients from Zhengzhou, Henan. The Zhengzhou International TeleMedicine Center is currently composed of three interrelated platforms: (a) International TelePathology platform, allowing the center to collaborate closely with the UCLA International Telepathology program led by Dr.
    [Show full text]
  • Levi Strauss & Co. Factory List
    Levi Strauss & Co. Factory List Published : November 2019 Total Number of LS&Co. Parent Company Name Employees Country Factory name Alternative Name Address City State Product Type (TOE) Initiatives (Licensee factories are (Workers, Staff, (WWB) blank) Contract Staff) Argentina Accecuer SA Juan Zanella 4656 Caseros Accessories <1000 Capital Argentina Best Sox S.A. Charlone 1446 Federal Apparel <1000 Argentina Estex Argentina S.R.L. Superi, 3530 Caba Apparel <1000 Argentina Gitti SRL Italia 4043 Mar del Plata Apparel <1000 Argentina Manufactura Arrecifes S.A. Ruta Nacional 8, Kilometro 178 Arrecifes Apparel <1000 Argentina Procesadora Serviconf SRL Gobernardor Ramon Castro 4765 Vicente Lopez Apparel <1000 Capital Argentina Spring S.R.L. Darwin, 173 Federal Apparel <1000 Asamblea (101) #536, Villa Lynch Argentina TEXINTER S.A. Texinter S.A. B1672AIB, Buenos Aires Buenos Aires <1000 Argentina Underwear M&S, S.R.L Levalle 449 Avellaneda Apparel <1000 Argentina Vira Offis S.A. Virasoro, 3570 Rosario Apparel <1000 Plot # 246-249, Shiddirgonj, Bangladesh Ananta Apparels Ltd. Nazmul Hoque Narayangonj-1431 Narayangonj Apparel 1000-5000 WWB Ananta KASHPARA, NOYABARI, Bangladesh Ananta Denim Technology Ltd. Mr. Zakaria Habib Tanzil KANCHPUR Narayanganj Apparel 1000-5000 WWB Ananta Ayesha Clothing Company Ltd (Ayesha Bangobandhu Road, Tongabari, Clothing Company Ltd,Hamza Trims Ltd, Gazirchat Alia Madrasha, Ashulia, Bangladesh Hamza Clothing Ltd) Ayesha Clothing Company Ltd( Dhaka Dhaka Apparel 1000-5000 Jamgora, Post Office : Gazirchat Ayesha Clothing Company Ltd (Ayesha Ayesha Clothing Company Ltd(Unit-1)d Alia Madrasha, P.S : Savar, Bangladesh Washing Ltd.) (Ayesha Washing Ltd) Dhaka Dhaka Apparel 1000-5000 Khejur Bagan, Bara Ashulia, Bangladesh Cosmopolitan Industries PVT Ltd CIPL Savar Dhaka Apparel 1000-5000 WWB Epic Designers Ltd 1612, South Salna, Salna Bazar, Bangladesh Cutting Edge Industries Ltd.
    [Show full text]
  • Curriculum Vitae
    CURRICULUM VITAE Prof. Pingyi Xu (徐评议) PhD & Postdoc Supervisor Director of Neurology the First Affiliated Hospital of Guangzhou Medical University Telephone: (86)13826161149 Email: [email protected] or [email protected] EDUCATION 1994: PhD, MD of Neurology, the First Affiliated Hospital Sun Yat-sen University of Medical Sciences, P. R. CHINA 1986: Bachelor’s in clinical medicine Jiangxi Medical University, P. R. CHINA POSITION HELD 2015.08 to present: Professor, Director, PhD supervisor & Postdoc advisor Department of Neurology, the First Affiliated Hospital of Guangzhou Medical University. 2004.01 to 2015.08: Professor & PhD supervisor & Postdoc advisor Department of Neurology, the First Affiliated Hospital of Sun Yat-sen University, CHINA; 2006.09 to 2007.09: Senior visiting scholar, Neuroscience of University of Kansas State Medical Center, USA; 2003.01 to 2004.01: Associate professor & Deputy chief physician, Department of Neurology, the First Affiliated Hospital of Sun Yat-sen University, CHINA; 2000.02 to 2002.10: Postdoc in Department of Neurology & Neuroscience, Methodist hospital Baylor College of Medicine, USA; 1994.07 to 2000.02: Attending physician & Lecturer, Department of Neurology, the First Affiliated Hospital of Sun Yat-sen University, CHINA. ACADEMIC AWARDS AND HONORS 1. National Science and Technology Progress Award (2nd Class), State Ministry of Science and Technology, P. R. China, 2000 2. Science and Technology Progress Award (1st Class), the Ministry of Health, P. R. China, 1999 3. Science and Technology Progress Award in Medical Health (2nd Class), Guangdong province, P. R. China, 1999 4. Guangdong Science and Technology Progress Award (2nd Class), Guangdong province, P. R. China, 1999 MEMBER OF SOCIETY AND PROFESSIONAL BODY 1.
    [Show full text]
  • Opportunities and Challenges for Diabetes Prevention at Two Community Health Centers
    Epidemiology/Health Services Research ORIGINAL ARTICLE Opportunities and Challenges for Diabetes Prevention at Two Community Health Centers 1 1 MILAGROS C. ROSAL, PHD STEPHENIE C. LEMON, PHD tients, guided this study. Within this 2 4 EVAN M. BENJAMIN, MD DOROTHEA VON GOELER, MD framework, we assessed quality-of-care 3 PENELOPE S. PEKOW, PHD domains from Donabedian’s Structure- Process-Outcome model (4) at the sys- tem level (system structure, including OBJECTIVE — Translating evidence-based diabetes prevention interventions to disadvan- health care resources) and at the provider taged groups is a public health priority that poses unique challenges. Community health centers level (processes related to technical ex- (CHCs) provide unequaled opportunities to prevent diabetes among poor and minority high- pertise and interpersonal relationships risk groups. This formative study sought to assess structural, processes-of-care (health care with patients). At the patient level, social quality domains), and patient factors that need to be considered for diabetes prevention at CHCs. cognitive theory (5) constructs (knowl- edge, attitudes, behaviors, and environ- RESEARCH DESIGN AND METHODS — A multimethod approach was implemented to assess system-, provider-, and patient-level factors at two large CHCs serving diverse urban mental influences) were assessed. communities. Institutional review board approval was obtained before study implementation. RESULTS — Medical chart audits (n ϭ 303) showed limited documentation of risks. Provider surveys (n ϭ
    [Show full text]